Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1491601 - (CVE-2017-2299) CVE-2017-2299 puppet-apache: Possible TLS trust misconfiguration in puppetlabs-apache
CVE-2017-2299 puppet-apache: Possible TLS trust misconfiguration in puppetlab...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170913,reported=2...
: Security
Depends On: 1491602
Blocks: 1491604
  Show dependency treegraph
 
Reported: 2017-09-14 05:03 EDT by Adam Mariš
Modified: 2018-02-12 06:28 EST (History)
24 users (show)

See Also:
Fixed In Version: puppet-apache 1.11.1, puppet-apache 2.1.0
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-10-27 21:06:22 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2017-09-14 05:03:34 EDT
Versions of the puppetlabs-apache module prior to 1.11.1 and 2.1.0 make it very easy to accidentally misconfigure TLS trust. If you specify the ssl_ca parameter but do not specify the ssl_certs_dir parameter, a default will be provided for the ssl_certs_dir that will trust certificates from any of the system-trusted certificate authorities. This did not affect FreeBSD.

Affected versions: puppetlabs-apache 0.7.0 - 1.11.0, puppetlabs-apache 2.x prior to 2.1.0

External References:

https://puppet.com/security/cve/CVE-2017-2299
Comment 1 Adam Mariš 2017-09-14 05:04:10 EDT
Created puppet-apache tracking bugs for this issue:

Affects: openstack-rdo [bug 1491602]
Comment 2 Kurt Seifried 2017-12-04 14:31:23 EST
Statement:

This issue affects Red Hat Satellite 6.1 and 6.2. Red Hat Product Security has rated this issue as having Low security impact. Red Hat Satellite 6.3 is not affected by this issue.

Note You need to log in before you can comment on or make changes to this bug.